Internet of Things: A Perspective from Security and Privacy

Main Article Content

deepika khambra

Abstract

Internet of Thing is a kind of network in which sensors and actuators are new to sense different type of data in the form of text and images. Security of sensors takes important role because these devices connected through internet. A malware or a misbehaving device may break down the system or forge secure or personal information from sensor node. To avoid this kind of issues cryptographic techniques is used. These techniques are AES, DES and RSA. In this paper security issue of IoT has been presented. After that a relative study of dissimilar cryptographic algorithms has been presented.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

Ovidiu Vermesan SINTEF, Norway, Peter FriessEU, Belgium, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystemsâ€, Elesvier publishers’ series in communications, 2013.

Ovidiu Vermesan SINTEF, Norway, Peter FriessEU, Belgium, “Internet of Things–From Research and Innovation to Market Deploymentâ€, Elesvier publishers’ series in communications, 2014.

Karen Rose, Scott Eldridge, Lyman Chapin, “The Internet of Things: An Overview Understanding the Issues and Challenges of a More Connected Worldâ€, The Internet Society (ISOC), 2015.

Xu Cheng, Minghui Zhang, Fuquan Sun, â€Architecture of internet of things and its key technology integration based-on RFID,†in 5thInternational Symposium on ComputationalIntelligence and Design, pp. 294-297, 2012.

Jose L. Hernandez-Ramos, Jorge Bernal Bernabe and Antonio F. Skarmeta, “Managing Context Information for Adaptive Security in IoT environmentsâ€, 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, pp: 676-681.

Minela Grabovica, Drazen Pezer, Srdan Popic and Vladimir Knezevic, “Provided security measures of enabling technologies in Internet of Things (IoT): A surveyâ€, IEEE Conference 2016, pp: 28-31.

Mujahid Mohsin, Zahid Anwar, Ghaith Husariy, Ehab Al-Shaery and Mohammad Ashiqur Rahmanz, “IoTSAT: A Formal Framework for Security Analysis of the Internet of Things (IoT)â€, IEEE Conference on Communications and Network Security (CNS)2016 pp: 1-9.

Jarkko Kuusijarvi, Reijo Savola, Pekka Savolainen and Antti Evesti, “Mitigating loT Security Threats with a Trusted Network Elementâ€, The 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), IEEE pp:260-265.

Fisnik Dalipi and Sule Yildirim Yayilgan, “Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challengesâ€, 4th International Conference on Future Internet of Things and Cloud Workshops2016, pp:63-68.

Elisa Bertino, “Data Privacy for IoT Systems Concepts, Approaches, and Research Directionsâ€, IEEE International Conference on Big Data (Big Data) 2016, pp:3645-3647.

Prasoon Raghav, Rahul Kumar and Rajat Parashar, “Securing Data in Cloud Using AES Algorithmâ€, International Journal of Engineering Science and Computing,2016, ISSN 2321 3361,pp: 3672-3675.

Priyesh Parikh, Satish N arkhede, “High performance implementation of Mixing of Column and inv Mixing of column for AES on FPGAâ€, International Conference on Computation of Power, Energy Information and Communication, IEEE2016, pp: 174-179.

S. Mary Sujatha and Y. Usha Devi, “Design and Implementation of IoT Testbed with Three Factor Authenticationâ€, IEEE 2015, pp: 1-5.

Reinhard Behrens and Ali Ahmed “Internet of Things: An End-to-End Security Layerâ€, IEEE 2017, pp: 146-149.

Md Husamuddin and Mohammed Qayyum, “Internet of Things A Study on Security and Privacy Threatsâ€, IEEE 2017, pp: 1-5.